Night Wing wrote:The user on Reddit, "oxychromaticdynamite" is a "know it all" who DOESN'T know it all when it comes to Pale Moon since he DOESN'T use Pale Moon.
I actually can't even read quite a few of his comments because they show as gibberish. XD
But yes, the user obviously has no clue about how security bugs are handled by me, and instead of actually asking, just jumping to conclusions and finding "evidence" about "unpatched vulnerabilities" that aren't vulnerabilities.
If our code isn't vulnerable, then there is also no reason to add (unnecessary) extra checking code to work around a non-existing problem. I tested with the (as of yet still undisclosed) proofs of concept and crash tests, and Pale Moon happily
doesn't overflow the buffer and
doesn't crash, no matter how hard I've tried
So yes, it's correctly asserted that there is no overflow check where Mozilla added one when they patched their code, but it should be noted that that is because there is no overflow danger (and I have a good idea when Firefox became vulnerable to this, which is not an issue for us). It could still be patched as a defense-in-depth precaution, in case it may - theoretically - become vulnerable in the future, if that would make overly concerned people happy - making it a direct reflection of the "security state of Pale Moon" is BS, however, since DiD is precautionary "just in case our code is going to change in such a way that it becomes a hazard". It's certainly not something that "is a security hazard" in its current state or considered critical.
We neither can nor are obligated to apply all patches that exist for a different product. In fact, blindly doing so may break
our product with a relatively high degree of certainty in quite a few cases.
"There is no point in arguing with an idiot, because then you're both idiots." - Anonymous
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite